GB2589877B - An apparatus and method of controlling access to data stored in a non-trusted memory - Google Patents
An apparatus and method of controlling access to data stored in a non-trusted memory Download PDFInfo
- Publication number
- GB2589877B GB2589877B GB1918126.2A GB201918126A GB2589877B GB 2589877 B GB2589877 B GB 2589877B GB 201918126 A GB201918126 A GB 201918126A GB 2589877 B GB2589877 B GB 2589877B
- Authority
- GB
- United Kingdom
- Prior art keywords
- data stored
- controlling access
- trusted memory
- trusted
- memory
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1458—Protection against unauthorised use of memory or access to memory by checking the subject access rights
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/08—Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
- G06F12/0802—Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches
- G06F12/0866—Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches for peripheral storage systems, e.g. disk cache
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1408—Protection against unauthorised use of memory or access to memory by using cryptography
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
- G06F12/1425—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block
- G06F12/1441—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block for a range
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1918126.2A GB2589877B (en) | 2019-12-10 | 2019-12-10 | An apparatus and method of controlling access to data stored in a non-trusted memory |
US17/756,877 US12248409B2 (en) | 2019-12-10 | 2020-11-12 | Apparatus and method of controlling access to data stored in a non-trusted memory |
KR1020227022984A KR20220108152A (en) | 2019-12-10 | 2020-11-12 | Apparatus and method for controlling access to data stored in untrusted memory |
PCT/GB2020/052882 WO2021116655A1 (en) | 2019-12-10 | 2020-11-12 | An apparatus and method of controlling access to data stored in a non-trusted memory |
CN202080085327.7A CN114761957A (en) | 2019-12-10 | 2020-11-12 | Apparatus and method for controlling access to data stored in untrusted memory |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1918126.2A GB2589877B (en) | 2019-12-10 | 2019-12-10 | An apparatus and method of controlling access to data stored in a non-trusted memory |
Publications (3)
Publication Number | Publication Date |
---|---|
GB201918126D0 GB201918126D0 (en) | 2020-01-22 |
GB2589877A GB2589877A (en) | 2021-06-16 |
GB2589877B true GB2589877B (en) | 2022-01-12 |
Family
ID=69172008
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1918126.2A Active GB2589877B (en) | 2019-12-10 | 2019-12-10 | An apparatus and method of controlling access to data stored in a non-trusted memory |
Country Status (5)
Country | Link |
---|---|
US (1) | US12248409B2 (en) |
KR (1) | KR20220108152A (en) |
CN (1) | CN114761957A (en) |
GB (1) | GB2589877B (en) |
WO (1) | WO2021116655A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2616049A (en) * | 2022-02-25 | 2023-08-30 | Toshiba Kk | Authentication method and system, a quantum communication network, and a node for quantum communication |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060123250A1 (en) * | 1999-07-16 | 2006-06-08 | Intertrust Technologies Corporation | Trusted storage systems and methods |
US20080172562A1 (en) * | 2007-01-12 | 2008-07-17 | Christian Cachin | Encryption and authentication of data and for decryption and verification of authenticity of data |
US20140380124A1 (en) * | 2011-11-01 | 2014-12-25 | Cleversafe, Inc. | Acquiring a trusted set of encoded data slices |
US20170147356A1 (en) * | 2014-04-28 | 2017-05-25 | Intel Corporation | Securely booting a computing device |
US20170289151A1 (en) * | 2016-03-29 | 2017-10-05 | Mark W. Shanahan | Technologies for dynamic loading of integrity protected modules into secure enclaves |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010019916A1 (en) * | 2008-08-14 | 2010-02-18 | The Trustees Of Princeton University | Hardware trust anchors in sp-enabled processors |
US9336410B2 (en) * | 2009-12-15 | 2016-05-10 | Micron Technology, Inc. | Nonvolatile memory internal signature generation |
JP6788610B2 (en) * | 2015-04-30 | 2020-11-25 | コーニンクレッカ フィリップス エヌ ヴェKoninklijke Philips N.V. | Cryptographic device for calculating block cyphers |
US11169934B2 (en) * | 2018-06-28 | 2021-11-09 | Intel Corporation | Systems, methods and apparatus for low latency memory integrity mac for trust domain extensions |
-
2019
- 2019-12-10 GB GB1918126.2A patent/GB2589877B/en active Active
-
2020
- 2020-11-12 KR KR1020227022984A patent/KR20220108152A/en active Pending
- 2020-11-12 WO PCT/GB2020/052882 patent/WO2021116655A1/en active IP Right Grant
- 2020-11-12 US US17/756,877 patent/US12248409B2/en active Active
- 2020-11-12 CN CN202080085327.7A patent/CN114761957A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060123250A1 (en) * | 1999-07-16 | 2006-06-08 | Intertrust Technologies Corporation | Trusted storage systems and methods |
US20080172562A1 (en) * | 2007-01-12 | 2008-07-17 | Christian Cachin | Encryption and authentication of data and for decryption and verification of authenticity of data |
US20140380124A1 (en) * | 2011-11-01 | 2014-12-25 | Cleversafe, Inc. | Acquiring a trusted set of encoded data slices |
US20170147356A1 (en) * | 2014-04-28 | 2017-05-25 | Intel Corporation | Securely booting a computing device |
US20170289151A1 (en) * | 2016-03-29 | 2017-10-05 | Mark W. Shanahan | Technologies for dynamic loading of integrity protected modules into secure enclaves |
Also Published As
Publication number | Publication date |
---|---|
US20230113906A1 (en) | 2023-04-13 |
GB2589877A (en) | 2021-06-16 |
US12248409B2 (en) | 2025-03-11 |
WO2021116655A1 (en) | 2021-06-17 |
CN114761957A (en) | 2022-07-15 |
KR20220108152A (en) | 2022-08-02 |
GB201918126D0 (en) | 2020-01-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11202010940SA (en) | Multi-level storage method and apparatus for blockchain data | |
EP3992801A4 (en) | Data storage method for flash memory device and flash memory device | |
SG11202009089SA (en) | Method and apparatus for controlling data access right | |
PL3614270T3 (en) | Apparatus and method for memory management in a graphics processing environment | |
EP3980995A4 (en) | Method of programming memory device and related memory device | |
IL280712A (en) | An apparatus and method for controlling memory accesses | |
EP3547248B8 (en) | Method and system for controlling write processing to an external memory | |
GB2557366B (en) | An apparatus and method for transferring data between address ranges in memory | |
EP4213036A4 (en) | DATA STORAGE METHOD AND APPARATUS | |
SG11202107831WA (en) | Access control method and device, and electronic device and storage medium | |
TWI562149B (en) | Memory control circuit unit, memory storage apparatus and data accessing method | |
SG11202108697RA (en) | Virtual object control method and apparatus, storage medium, and electronic device | |
TWI561981B (en) | Data reading method, memory control circuit unit and memory storage apparatus | |
GB2540940B (en) | An apparatus and method for transferring a plurality of data structures between memory and one or more vectors of data elements stored in a register bank | |
EP3948868A4 (en) | Method of programming and verifying memory device and related memory device | |
EP3953807A4 (en) | Data loading and storage instruction processing method and device | |
EP3869313A4 (en) | Data storage method and apparatus | |
GB201814149D0 (en) | System and method for providing protected data storage in a data memory | |
SG10202102099XA (en) | Data complementing system and data complementing method | |
EP3953938A4 (en) | Memory device capable of reducing program disturbance and erasing method thereof | |
GB2589877B (en) | An apparatus and method of controlling access to data stored in a non-trusted memory | |
EP3923288A4 (en) | Memory and access method | |
GB202001900D0 (en) | Methods and apparatus for controlling access to personal data | |
GB201415951D0 (en) | Device and method for storing data in a plurality of multi-level cell memory chips | |
DK3935906T3 (en) | Methods and devices for specifying information in a random access method |